| 1. | 2 . a data preprocessing method has been used 提出了一种对web访问日志进行预处理的方法。 |
| 2. | Studies on web usage data mining 用户访问日志数据挖掘研究 |
| 3. | The web usage mining mines web log records to discover users access patterns of web pages Web访问挖掘是通过分析web访问日志来发现用户访问web页面的模式。 |
| 4. | For the backup jobs and copy jobs to succeed , they must have access to the log shipping backup folder 若要使备份作业和复制作业成功,它们必须都能访问日志传送备份文件夹。 |
| 5. | Overflowlogpath - specify the location of the logs during a rollforward operation to allow access logs in multiple locations Overflowlogpath指定前滚操作中的日志位置,以便在多个位置访问日志。 |
| 6. | For example , for purposes of this article i created an xml representation of an approximately 1 megabyte apache access logfile 例如,出于本文目的我创建了一个大约一兆字节的apache访问日志文件的xml表示。 |
| 7. | This is a " lo - fi " version of our main content . to view the full version with more information , formatting and images , please click here 前几天由于硬盘上的访问日志容量过大,把硬盘弄满了,后来影响到了数据库的运行,以至不能访问 |
| 8. | If the log shipping backup location is accessible to the new principal primary server , its backup jobs begin to ship log backups to that location 如果新的主体/主服务器可以访问日志传送备份位置,则其备份作业将开始向该位置传送日志备份。 |
| 9. | We can get information of related websites and hot - spots by mining network log files and apply mined knowledge on instructing the operation of chord network to improve network performance 通过对网络访问日志的挖掘,获取关联网络节点信息和过热节点信息等,并利用挖掘出来的知识指导chord网络的运行,从而改进网络性能。 |
| 10. | The raw weblog data need to be cleaned , condensed and transformed in order to retrieve and analyze significant and useful information . then the web log records are organized into some transactions or sessions in a database 通过预处理web访问日志,删除对于web挖掘没有价值的数据,识别出用户会话事务,形成用户会话的数据库。 |